Sciweavers

123 search results - page 4 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
OOPSLA
2005
Springer
15 years 5 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CCS
2009
ACM
15 years 4 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
SWAP
2008
15 years 26 days ago
OWL Change Management Patterns
Ontology evolution is a complex problem. In our work, we focus on issues related to change management, particularly consistency maintenance and we present in this paper, an overvie...
Rim Djedidi, Marie-Aude Aufaure
COR
2002
95views more  COR 2002»
14 years 11 months ago
Dynamic lot sizing and tool management in automated manufacturing systems
The overall aim of this study is to show that there is a critical interface between the lot sizing and tool management decisions, and these two problems cannot be viewed in isolat...
M. Selim Akturk, Siraceddin Onen
SACMAT
2009
ACM
15 years 6 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...